Works matching Data security failures
Results: 2075
Akademisyenlerin Dijital Veri Güvenliği Farkındalıkları Üzerine Bir Araştırma: Malatya Örneği.
- Published in:
- Gümüshane University Journal of Social Sciences (GUSBID) / Gümüshane Üniversitesi Sosyal Bilimler Dergisi (GUSBID), 2023, v. 14, n. 2, p. 429
- By:
- Publication type:
- Article
Only the Beginning?
- Published in:
- Quality Progress, 2014, v. 47, n. 2, p. 10
- Publication type:
- Article
How Big Data Feeds Big Crime.
- Published in:
- Current History, 2018, v. 117, n. 795, p. 29, doi. 10.1525/curh.2018.117.795.29
- By:
- Publication type:
- Article
YOUR MONEY OR YOUR DATA.
- Published in:
- Journal of the Missouri Bar, 2019, v. 75, n. 2, p. 82
- By:
- Publication type:
- Article
The protection of customer personal data as an element of entrepreneurs’ ethical conduct.
- Published in:
- Annales. Etyka w Zyciu Gospodarczym, 2018, v. 21, n. 7, p. 27, doi. 10.18778/1899-2226.21.7.02
- By:
- Publication type:
- Article
ANONYMOUS DATA V. PERSONAL DATA—A FALSE DEBATE: AN EL PERSPECTIVE ON ANONYMIZATION, PSELDONYMIZATION AND PERSONAL DATA.
- Published in:
- Wisconsin International Law Journal, 2016, v. 34, n. 2, p. 284
- By:
- Publication type:
- Article
America Has Been Breached.
- Published in:
- Journal of Counterterrorism & Homeland Security International, 2015, v. 21, n. 2, p. 8
- By:
- Publication type:
- Article
DATA AT RISK.
- Published in:
- Internal Auditor, 2018, v. 75, n. 5, p. 72
- By:
- Publication type:
- Article
VERİ SORUMLUSUNUN VERİ GÜVENLİĞİNE İLİŞKİN İDARİ VE TEKNİK TEDBİRLERİ ALMA YÜKÜMLÜLÜĞÜ.
- Published in:
- Istanbul Commerce University Journal of Social Sciences / İstanbul Ticaret Üniversitesi Sosyal Bilimler Dergisi, 2023, v. 22, n. 48, p. 899, doi. 10.46928/iticusbe.1218693
- By:
- Publication type:
- Article
The Craziest Information Security Stories of 2018.
- Published in:
- ISSA Journal, 2019, v. 17, n. 1, p. 8
- By:
- Publication type:
- Article
2017 Infosec Law Year in Review.
- Published in:
- ISSA Journal, 2018, v. 16, n. 1, p. 5
- By:
- Publication type:
- Article
Why Information Security Teams Fail.
- Published in:
- ISSA Journal, 2016, v. 14, n. 2, p. 28
- By:
- Publication type:
- Article
THE HOODIE TEST.
- Published in:
- ITNOW, 2018, v. 60, n. 1, p. 36, doi. 10.1093/itnow/bwy017
- By:
- Publication type:
- Article
PSYCHICS, RUSSIAN ROULETTE, AND DATA SECURITY: THE FTC'S HIDDEN DATA-SECURITY REQUIREMENTS.
- Published in:
- George Mason Law Review, 2013, v. 20, n. 3, p. 673
- By:
- Publication type:
- Article
Mobile Research Applications and State Data Protection Statutes.
- Published in:
- Journal of Law, Medicine & Ethics, 2020, v. 48, p. 87, doi. 10.1177/1073110520917033
- By:
- Publication type:
- Article
Data Breaches Are Not Just Information Technology Worries!
- Published in:
- Pediatric Nursing, 2019, v. 45, n. 2, p. 59
- By:
- Publication type:
- Article
Providers Can Take Action to Help Prevent Doxing.
- Published in:
- Contraceptive Technology Update, 2022, v. 43, n. 10, p. 114
- Publication type:
- Article
AFTER THE DATA BREACH: NOTIFICATION LAWS AND MORE.
- Published in:
- Issues in Information Systems, 2015, v. 16, n. 4, p. 86
- By:
- Publication type:
- Article
Consumer Valuation of Personal Information in the Age of Big Data.
- Published in:
- Journal of the Association for Information Science & Technology, 2018, v. 69, n. 1, p. 60, doi. 10.1002/asi.23915
- By:
- Publication type:
- Article
Access Denied: Data Breach Litigation, Article III Standing, and a Proposed Statutory Solution.
- Published in:
- Columbia Journal of Law & Social Problems, 2017, v. 51, n. 1, p. 79
- By:
- Publication type:
- Article
Developments in Data Security Breach Liability.
- Published in:
- Business Lawyer, 2014, v. 70, n. 1, p. 231
- By:
- Publication type:
- Article
CORPORATE DIRECTORS’ AND OFFICERS’ CYBERSECURITY STANDARD OF CARE: THE YAHOO DATA BREACH.
- Published in:
- American University Law Review, 2017, v. 66, n. 5, p. 1231
- By:
- Publication type:
- Article
CORPORATE DIRECTOR'S AND OFFICER'S CYBERSECURITY STANDARD OF CARE: THE YAHOO DATA BREACH.
- Published in:
- American University Law Review, 2017, v. 66, n. 5, p. 1231
- By:
- Publication type:
- Article
Keep Calm and Tweet On: Legal and Ethical Considerations for Pathologists Using Social Media.
- Published in:
- Archives of Pathology & Laboratory Medicine, 2019, v. 143, n. 1, p. 75, doi. 10.5858/arpa.2018-0313-SA
- By:
- Publication type:
- Article
Your Personal Information Was Stolen? That's an Injury: Article III Standing in the Context of Data Breaches.
- Published in:
- University of the Pacific Law Review, 2019, v. 50, n. 3, p. 427
- By:
- Publication type:
- Article
GOVERNMENT ENFORCEMENT WHEN PRIVATE DATE INFORMATION IS BREACHED: GUIDANCE AND BEST PRACTICES.
- Published in:
- Northern Kentucky Law Review, 2017, v. 44, n. 1, p. 41
- By:
- Publication type:
- Article
CYBER INSURANCE.
- Published in:
- Bench & Bar of Minnesota, 2015, v. 72, n. 10, p. 16
- By:
- Publication type:
- Article
A DAY IN COURT FOR DATA BREACH PLAINTIFFS: PRESERVING STANDING BASED ON INCREASED RISK OF IDENTITY THEFT AFTER CLAPPER V. AMNESTY INTERNATIONAL USA.
- Published in:
- Michigan Law Review, 2016, v. 114, n. 8, p. 1471
- By:
- Publication type:
- Article
Risk and Anxiety: A Theory of Data-Breach Harms.
- Published in:
- Texas Law Review, 2018, v. 96, n. 4, p. 737
- By:
- Publication type:
- Article
HEALTH CARE HELD RANSOM: MODIFICATIONS TO DATA BREACH SECURITY & THE FUTURE OF HEALTH CARE PRIVACY PROTECTION.
- Published in:
- 2018
- By:
- Publication type:
- Abstract
Should CPA Firms Be Worried about Data Breach Claims?
- Published in:
- CPA Journal, 2019, v. 89, n. 3, p. 16
- By:
- Publication type:
- Article
LIABILITY FOR DATA INJURIES.
- Published in:
- University of Illinois Law Review, 2019, v. 2019, n. 1, p. 295
- By:
- Publication type:
- Article
For-profit versus non-profit cybersecurity posture: breach types and locations in healthcare organisations.
- Published in:
- Health Information Management Journal, 2024, v. 53, n. 3, p. 198, doi. 10.1177/18333583231158886
- By:
- Publication type:
- Article
Wearable devices in healthcare: Privacy and information security issues.
- Published in:
- Health Information Management Journal, 2020, v. 49, n. 2/3, p. 150, doi. 10.1177/1833358319851684
- By:
- Publication type:
- Article
How can hospitals better protect the privacy of electronic medical records? Perspectives from staff members of health information management.
- Published in:
- Health Information Management Journal, 2017, v. 46, n. 2, p. 87, doi. 10.1177/1833358316671264
- By:
- Publication type:
- Article
National Cyber Governance Awareness Policy and Framework.
- Published in:
- International Journal of Legal Information, 2019, v. 47, n. 2, p. 70, doi. 10.1017/jli.2019.22
- By:
- Publication type:
- Article
The ransomware threat grows. How your practice can prepare: Using antivirus so ware consistently is among the steps you should take.
- Published in:
- Urology Times, 2021, v. 49, n. 8, p. 37
- By:
- Publication type:
- Article
Business/PRACTICE MATTERS. Cybercrime on the rise during COVID-19 pandemic.
- Published in:
- Urology Times, 2020, v. 48, n. 7, p. 36
- By:
- Publication type:
- Article
Cybersecurity: What you need to know to protect your practice: Threats are growing in sophistication; here's what you can do to stop them.
- Published in:
- Urology Times, 2019, v. 47, n. 6, p. 24
- By:
- Publication type:
- Article
Why you should take a risk-aware approach to cybersecurity: A compliance-focused mindset fails to adequately address threats to a practice.
- Published in:
- Urology Times, 2019, v. 47, n. 5, p. 29
- By:
- Publication type:
- Article
Are you taking steps to prevent data breaches? Training staff to recognize phishing attacks is one step you can take now.
- Published in:
- Urology Times, 2017, v. 45, n. 12, p. 24
- By:
- Publication type:
- Article
Data Security's Unjust Enrichment Theory.
- Published in:
- University of Chicago Law Review, 2020, p. 2477
- By:
- Publication type:
- Article
Looking for Waldo.
- Published in:
- Law Library Journal, 2019, v. 111, n. 4, p. 613
- By:
- Publication type:
- Article
¿PUEDE CONSTRUIRSE UN SISTEMA DE RESPONSABILIDAD PRECONTRACTUAL? ANÁLISIS DE LOS DEBERES PRECONTRACTUALES Y LAS CONSECUENCIAS JURÍDICAS DERIVADAS DE SU INFRACCIÓN.
- Published in:
- Revista Jurídica de la Universidad Autonóma de Madrid, 2024, n. 49, p. 133, doi. 10.15366/rjuam2024.49.005
- By:
- Publication type:
- Article
Analytical Techniques for Decision Making on Information Security for Big Data Breaches.
- Published in:
- International Journal of Information Technology & Decision Making, 2018, v. 17, n. 2, p. 527, doi. 10.1142/S0219622017500432
- By:
- Publication type:
- Article
Trust and The Acquisition and Use of Public Health Information.
- Published in:
- Health Care Analysis, 2022, v. 30, n. 1, p. 1, doi. 10.1007/s10728-021-00436-y
- By:
- Publication type:
- Article
Privacy-Preserving Certificateless Cloud Auditing with Multiple Users.
- Published in:
- Wireless Personal Communications, 2019, v. 106, n. 3, p. 1161, doi. 10.1007/s11277-019-06208-1
- By:
- Publication type:
- Article
Preserving Data Privacy During Data Transfer in MANETs.
- Published in:
- Wireless Personal Communications, 2017, v. 97, n. 3, p. 4063, doi. 10.1007/s11277-017-4713-2
- By:
- Publication type:
- Article
Self-Disclosure or Burying the Evidence Dilemma: A Legal Review of the Data Breach Rules under the Turkish Personal Data Protection Law.
- Published in:
- Annales de la Faculté de Droit d'Istanbul, 2021, n. 70, p. 195, doi. 10.26650/annales.2021.70.0007
- By:
- Publication type:
- Article
Sustainability in Global Supply Chains Under the CISG.
- Published in:
- European Journal of Law Reform, 2021, v. 23, n. 3, p. 300, doi. 10.5553/EJLR/138723702021023003002
- By:
- Publication type:
- Article